In 2024 alone, phishing campaigns drove an 84% increase in infostealer malware through email¹. Stolen credentials also rose by 42% year-on-year¹. These are not incremental changes; they signal a structural transformation in enterprise risk.
For CIOs, CISOs, and boards, the implications are clear. Cybersecurity is no longer an IT function to be managed in isolation. It is a strategic leadership priority with direct impact on trust, compliance, and enterprise resilience. Yet a gap remains: 72% of organisations globally report rising cyber risk². In India, only about 24% of firms demonstrate mature cybersecurity readiness³.
The challenge is not just technological; it is organisational. And closing this gap will require leadership to rethink not only security architecture but also the governance, accountability, and partnerships that underpin it.
The new threat landscape
AI-enabled threats are fundamentally different from legacy attacks:
- Synthetic identity: Near-perfect replication of a CEO’s voice or likeness to deceive employees and partners.
- LLM infiltration: Exploiting enterprise models to extract sensitive data or manipulate outputs.
- Business workflow abuse: Triggering unauthorised outcomes not through code injection but through logical manipulation.
- Adaptive malware: Continuous evolution to bypass signature-based detection.
This evolution has transformed cybersecurity into a form of psychological and systemic warfare. Attackers no longer rely on volume alone; they exploit context, trust, and human decision-making at scale—and increasingly, they target the very AI systems that power enterprise defenses.
Techniques such as data poisoning, prompt injection, and model evasion are emerging as new vectors of compromise, corrupting training data, manipulating model outputs, and bypassing detection logic.
Why traditional approaches are failing
Enterprises are responding with more tools. On average, 83 security tools across 29 vendors. But fragmentation creates its own risk: limited integration, alert fatigue, and strained talent pools. Attackers, meanwhile, are running AI-powered playbooks in milliseconds.
The result is declining leadership confidence. The issue is not simply a gap in security coverage, but also in governance and resilience. Treating cyber as a procurement cycle rather than a strategic mandate leaves enterprises exposed in ways that can no longer be defended with incremental fixes.
Three strategic shifts for CIOs and CISOs
Leading enterprises are already adapting by embedding AI into their defence posture. Three priorities stand out:
1. Contextual detection
Traditional tools detect anomalies. AI-powered systems detect intent. A login may appear normal, but when correlated with phishing activity, unusual browser fingerprints, and suspicious cloud downloads, intent is revealed. This is how organizations can stop attacks before they materialize into breaches.
2. Autonomous response
Ransomware does not wait for manual approvals. Embedding GenAI into Security Operations Centres enables auto-triage, prioritisation, and response initiation. Early adopters report up to 60% faster mitigation4, freeing human analysts for strategic oversight rather than reactive firefighting.
3. Continuous exposure management
Periodic scanning is no longer sufficient. Continuous Threat Exposure Management (CTEM) frameworks—including breach simulations, AI-generated attack paths, and real-time posture assessments—ensure that the enterprise continuously identifies exploitable weaknesses, not just compliance gaps.
Why this matters for India
India is projected to be the fastest-growing cybersecurity market globally5. Yet, half of cyberattacks now originate outside the top 10 metros6, targeting mid-tier firms and regional players that often lack enterprise-grade defences. This shift demands a sovereign, AI-native, compliance-aligned security infrastructure that is attuned to local regulatory frameworks, such as DPDP, RBI, and IRDAI.
For Indian enterprises, embedding cyber resilience is not just about defence. It is about enabling the ambition of a digital economy where trust becomes a competitive differentiator.
The leadership mandate: Designing for trust
Boards are asking new questions:
- Can we detect and neutralise deepfakes before they cause reputational harm?
- Are our LLMs protected from intellectual property leakage?
- If an attack occurs at 3 am, who—or what—is responding?
The answers cannot come from IT alone: they must come from leadership. Trust is now the core currency of digital business. And trust cannot be retrofitted post-incident. It must be designed into systems, processes, and partnerships from Day Zero.
The role of MSSPs in the GenAI era
The Managed Security Service Provider (MSSP) is central to this new paradigm, but only if it evolves beyond monitoring. The MSSP of the future must operate as a strategic augmentation of enterprise intelligence, delivering:
- AI-powered threat hunting
- Real-time SOC orchestration
- Adaptive zero-trust enforcement
- Secure LLM governance
- API security
- AI Security posture management
- Industry- and geography-specific threat intelligence
Tata Communications has built a Security Fabric designed for cyber resilience, fusing advanced protection with expert-led insight. Supported by 24/7 Cyber Security Response Centres, geo-redundant recovery infrastructure, and AI-powered automated response systems that anticipate and mitigate threats in real time for automated response, our objective is not just faster detection but systemic resilience: the ability to anticipate, defend, and respond.
From spending to resilience
Enterprises cannot outspend AI-enabled adversaries. But they can outsmart them. That requires reframing cybersecurity from a technical safeguard to a leadership mandate for resilience. The organisations that will thrive in this new normal are those that see clearly, respond intelligently, and embed trust at the heart of their business models.
In the GenAI era, security is not only about protection. It is about enabling continuity, compliance, and confidence in a world where the attacker evolves as fast as the technology itself.
Sources
- “Phishing Emails Drive 84% Surge in Infostealer Attacks” — Gracker / Infostealers research (2024).
- World Economic Forum — Global Cybersecurity Outlook 2025: 72% of organizations report rising cyber risk.
- Cisco Cybersecurity Readiness Index (2023) — 24% of Indian organizations at “mature” readiness.
- Gartner — Market Guide for Managed Detection and Response Services (2024).
- IDC — India Cybersecurity Market Outlook (2024).
- Tata Communications Cybersecurity Solutions overview (public site, 2024–25).
Read More from This Article: Cyber resilience in the age of AI conflict
Source: News

